Create a Post
cancel
Showing results for 
Search instead for 
Did you mean: 
Arturxr
Explorer
Jump to solution

connecting to unauthorized proxy or vpn to bypass security policies on checkpoint?

how to determine from checkpoint logs which network user connects to an unauthorized proxy server or vpn to bypass security policies on checkpoint?

0 Kudos
1 Solution

Accepted Solutions
Chris_Atkinson
Employee Employee
Employee

Filter logs/reports/views as suggested by @PhoneBoy you may also wish to add the "Anonymizer" category 

CCSM R77/R80/ELITE

View solution in original post

0 Kudos
2 Replies
PhoneBoy
Admin
Admin

It depends on how the end user is connecting and what blades are active.
If you have App Control on for all Internet-facing traffic, there are categories for proxies and VPN you can search on.
You'll see more if HTTPS Inspection is enabled as well. 
That assume you've constructed your rulebase correctly.

If your outbound access rule includes the service Any, it's highly recommended you restrict that to needed services only to minimize the risk of either connecting to a proxy or VPN.

0 Kudos
Chris_Atkinson
Employee Employee
Employee

Filter logs/reports/views as suggested by @PhoneBoy you may also wish to add the "Anonymizer" category 

CCSM R77/R80/ELITE
0 Kudos

Leaderboard

Epsum factorial non deposit quid pro quo hic escorol.

Upcoming Events

    CheckMates Events